Once you have set up your remote access tool, you can open all of your computer’s files and programs remotely, i.e. from another device. You don’t even have to be within the same building. You can be on the other side of the world and, providing you have an Internet connection, use your computer as if it was right in front of you.

While remote access can come in handy in many situations, it does come with a word of caution. Just like you wouldn’t leave your front door wide open, you shouldn’t leave your computer’s remote access option unchecked. Take some time to educate yourself on the uses of remote access and the security behind it and you’ll be far better off in the long run.

As a preliminary note, be aware that receiving remote desktop connections from this program can only be done on operating systems higher than Windows 7 Professional. Also, make sure that neither PC is set to sleep or hibernate because the link won’t be made if one system doesn’t have a live Internet connection.

To set up a remote access connection between two Windows PCs:

On the PC that is the remote machine, search for Allow remote access to your computer and launch.

Under Remote Desktop, select Allow connections from computers running any version of Remote Desktop (or from those with Network Level Authentication if you’re using anything beyond XP).

Click Select Users and add users who you wish to have access – this is a security step that will ensure only those you give permission to will be able to connect.

On your other PC, search for Remote Desktop Connection and launch. Either type in the name of the computer you wish to connect to (in the format of user, domain, workgroup) or the system’s static IP. You’re connected!

When & Where To Use Remote Access

Before we delve a bit deeper into the safety side of things, let’s talk application and the way that you can make use of remote access in your day-to-day life.

Accessing Your Own Files

Perhaps the most obvious use for remote access is logging into your own computer from another location. Imagine you’re on your way to work or school when you realise that the all-important file you need for that day is stuck in your Documents rather than in the cloud or on a memory stick. Problem solved with remote access: once you’re at your destination you can link to your computer and send the file across to yourself with ease. Beyond Remote Desktop Connection, there are also programs that have been specifically made to help you fetch files remotely4 Remote Desktop Apps To Fetch Files In Windows & Beyond4 Remote Desktop Apps To Fetch Files In Windows & BeyondMicrosoft recently removed SkyDrive's "Fetch" feature. Here we show you how you can access files remotely on and from various device, including Mac, Linux, iOS, and Android.Read More.

Working From Anywhere

You could even take this a step further and use remote access to its full potential. Say you’ve got a lot of work to do, but want to get out of the house. Head to a coffee shop (or anywhere offering public WiFi3 Dangers Of Logging On To Public Wi-Fi3 Dangers Of Logging On To Public Wi-FiYou've heard that you shouldn't open PayPal, your bank account and possibly even your email while using public WiFi. But what are the actual risks?Read More) with a portable device and you can hook into your computer at home. You’ll be able to make use of your usual programs and settings and any changes to the system will be reflected immediately on your home machine. No need to worry about keeping two systems up to date!

Providing Tech Support For Family & Friends

If you know even a little bit about computers (and chances are you do!), it’s not uncommon to become the go-to techie for your family and friends7 Ways to Ensure Your Loved Ones' PC Will Never Need Fixing7 Ways to Ensure Your Loved Ones' PC Will Never Need FixingAre you tech support for your family or friends? Do you receive frantic calls because they've installed malware or somehow managed to break their computer and they need you to fix it? This can be...Read More. Those of us in this position know how difficult it can be to explain something to someone less technology proficient. Forgo answering questions like “what’s the task bar?” by taking remote control of their computer and literally showing them how to resolve a problem. They can watch as you move their cursor and carry out the necessary steps for them. All they have to do is sit back and let you do the work – and hopefully learn for next time, of course.

How To Safely Use Remote Access

Here’s the million dollar question: just exactly how safe is remote access? Essentially, it’s as safe as you make it and that depends on the program you’re using. The main thing to bear in mind when thinking about security is that you want to ensure those who are using remote access are those who you’ve granted permission to.

Permitting Specific Users

A good remote access program should always ask you if you want to let someone in first, but issues can arise here through setup. For example, Windows will automatically allow all administrators access to log on through remote access. This isn’t an issue if every admin account on your computer has a strong password6 Tips For Creating An Unbreakable Password That You Can Remember6 Tips For Creating An Unbreakable Password That You Can RememberIf your passwords are not unique and unbreakable, you might as well open the front door and invite the robbers in for lunch.Read More, but what happens if down the line you create a new user account without a password? You’ve unknowingly opened yourself up to attackers sneaking in (bots scan open networks looking for vulnerabilities). As such, it’s always better to individually grant users access on a case-by-case basis.

To get better control over the users allowed access, press Windows Key + R to open Command Prompt and type secpol.msc and hit Enter. This will open your system’s Local Security Policy. Expand the Local Policies folder, click User Rights Assignment and double click Allow log on through Remote Desktop Services. From here you’ll be able to remove any groups or users that have been automatically added.

Similar to the steps described above, click Windows Key + R, type ‘gpedit.msc’, and hit Enter. This will open the Local Group Policy Editor. Filter the folders down by Computer Policy > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security. Click Set client connection encryption level and then select a suitable level – again, we recommend using High Level, which in this case is 128-bit encryption.

Filtering down this far within the Local Security Policy also lets you adjust whether a password is required once connected, if a secure RPC connection is required, and more.

Server Authentication

Along with the those more advanced steps, you can also help protect yourself within the Remote Desktop Connection utility itself. Launch it and then select the Advanced tab. From here you’ll be able to decide how the program should act if the server authentication fails. This is a step that helps determine that the system you’re connecting to is the right one. Should authentication fail you can choose to ignore it, be warned, or be warned and disconnected from the session. Either of the latter two options are best.

Educating On Standards

On a less technical level, but still equally as important, users need to be educated on the proper use and standards of remote access. In business it can be beneficial to distribute a procedure guide to employees to tell them the dos and don’ts: log out once finished (a good tool should time out automatically after lack of use), don’t allow unauthorised users into your machine and always password protect your accounts.

It’s still equally as important to educate on standards within a home environment, especially if there’ll be multiple users making use of remote access. It’s great if you’re knowledgeable on the security of it, but that becomes moot if other users aren’t and don’t use it responsibly.

While cloud services like Dropbox, Drive and OneDrive are going to be better options if you’re just looking to share data while on the move, there’s no denying how powerful something like remote access is. It can be used in a multitude of different situations, both within home and business.

If you’re looking to get up and running with remote access, approach it with a security-first attitude. Make sure you’re using a program that has your protection in mind, otherwise you’re only opening yourself up to vulnerabilities and headache down the line.

How do you use remote access and has the security of it ever concerned you?